General

  • Target

    2547db5c6fc2f091fbf60ae3b6be686aa09393eaa50a4548574df55acab814fdN

  • Size

    34KB

  • Sample

    241105-fzv6yaxqfm

  • MD5

    605d82cedd43c60be14d3e68723539a0

  • SHA1

    801d3f59ed8fed39042aacf28cad441d73c32944

  • SHA256

    2547db5c6fc2f091fbf60ae3b6be686aa09393eaa50a4548574df55acab814fd

  • SHA512

    2ebf72214361b4debddc4febbea96d4ce9deb8ae30abc8372334dbb0b9aac36f3a9199938952140cf7f8cf6e9f448d4746478fd1b236b5ed08898d0e4c68b509

  • SSDEEP

    768:wp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:wpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      2547db5c6fc2f091fbf60ae3b6be686aa09393eaa50a4548574df55acab814fdN

    • Size

      34KB

    • MD5

      605d82cedd43c60be14d3e68723539a0

    • SHA1

      801d3f59ed8fed39042aacf28cad441d73c32944

    • SHA256

      2547db5c6fc2f091fbf60ae3b6be686aa09393eaa50a4548574df55acab814fd

    • SHA512

      2ebf72214361b4debddc4febbea96d4ce9deb8ae30abc8372334dbb0b9aac36f3a9199938952140cf7f8cf6e9f448d4746478fd1b236b5ed08898d0e4c68b509

    • SSDEEP

      768:wp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:wpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks